The ruling opens up disturbing possibilities, such as broad, warrantless searches of e-mails, documents and contacts on smart phones, tablet computers, and perhaps even laptop computers, according to legal expert Mark Rasch.

Ok, I am not even going to argue that this is against the Fourth Amendment.I would just like to know how some of you would prepare for such events.

-I have an iPhone and I keep everything backed up and updated daily. I would assume that I would have a way of erasing the entirety of my iPhone on the fly; I believe a phone password would be sufficient in most cases - But heck lets pretend like your a celebrity

Suppose a team got a hold of your phone, if you connected through your home network on that phone so you were secure when you used it; could they potentially gain access to your home network?! In the case of paranoia I would hope someone here has a field day with my question in describing their precautionary measures taken

Since I really only use my iPod as a quick Internet device/calendar/other shit, I don't really have anything incriminating on it. If I did, however, full-disk encryption would be a must. The password only matters for interfacing with the device through the touch screen. If they take it from you they can basically do whatever they want with the data inside. If it's encrypted, this eliminates the possibility, or at least severely hampers it. Unfortunately I do not know of any good iPod-specific encryption programs.

Another thing that would be cool is to have two passwords; one for your normal usage and one that will wipe a specified set of files/folders when entered, then grant access. That way if your device is taken and they ask for the password, you can tell them the self-destructing one and they will most likely use it.

Goatboy wrote:Another thing that would be cool is to have two passwords; one for your normal usage and one that will wipe a specified set of files/folders when entered, then grant access. That way if your device is taken and they ask for the password, you can tell them the self-destructing one and they will most likely use it.

This sounds like a fun project xD. Something along the lines of the hidden partition system present in Truecrypt, so it couldn't be too hard, since there'd be code to compare it to. But with the way iOS is, it might be hard to implement unless you first replaced the default lock screen.

It's not who votes that counts, it's who counts the votesinsomaniacal.blog.com

Goatboy wrote:Not necessarily. Just modify the lock to accept one of two passwords:

The problem being getting at the code. I have a feeling it's locked up tightly and would take lots of reverse engineering to modify the original. Then again, I know no next to nothing about iOS other than that it's UNIX-Like.

It's not who votes that counts, it's who counts the votesinsomaniacal.blog.com

iOS is so locked up it isn't even funny. I suppose it MAY be possible if you wrote an app for a Jailbroken iPhone to auto lock in place of the built in screen lock. First, it would need to be Jailbroken I'm sure as apps can't delete files for other apps when it is still Jailed (I think, I'm not sure).

Sounds a lot like Little Brother, Goatboy... I had the same idea as I read the op.

The built in backup encryption is easily broken btw.

The glass is neither half-full nor half-empty; it's merely twice as big as it needs to be.

S4ltine wrote:In this fun theory of things, how would you run a "Rick Rolled " executable when/as it deletes; How would you wipe everything and preserve the executable?

wat

This is either a troll question or the most retarded question I have heard in a long time.

If you want to Rick Roll someone while it's wiping your files, just play the damn video on the iPod. If you want to preserve the executable, don't tell it to delete itself. Is this really that hard to understand?